Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

VOTE - Adopt OpenVEX as project within the OpenSSF under Vuln Disclosure Working Group (WG) #125

Closed
SecurityCRob opened this issue Mar 8, 2023 · 148 comments
Labels

Comments

@SecurityCRob
Copy link
Contributor

VEX is an emerging spec, and tool set to ease the burden of determining vulnerability exploitation likelihood within components used during a build. OpenVEX is a community currently developing a spec, GO and Rust libraries, and a toolset to further determine minimal requirements as defined by the CISA VEX working group, GO and RUST libraries enabling the ingestion of metadata in other VEX implementations, and the toolset to create, merge, and attest VEX documents. OpenVEX has asked for adoption within the OpenSSF vulnerability disclosures working group towards its spec, libraries, and toolset being further developed and towards ISO specification through the PAS Submitter process

We are seeking the working group's opinion on whether or not to adopt the OpenVEX project (https://github.com/openvex/spec) as an official OpenSSF project under the Vulnerability Disclosure Working Group. If adopted, the working group would collaborate with the project team on refinements and updates to the specification, collaborate on possible tooling to implement the project seamlessly into developer workflows, and provide support for the ultimate proposal of OpenVEXas an industry standard through the OpenSSF's industry standardization processes.

Working Group Maintainers, Collaborators, and Contributors (https://github.com/ossf/wg-vulnerability-disclosures#governance) are invited to formally vote on their choice to adopt this project, or not. Additionally, non-working group members are welcome to express their opinions, but not as official voting members of the group. Members please complete your vote and/or add your comments no later than the next working group meeting, 22March2023, so the results can be discussed in our call.

If this project is adopted by the WG, next steps would be following the TAC's project submission procedure for donated content & intellectual property review (https://github.com/ossf/tac/blob/main/process/project-lifecycle.md).

@rjb4standards
Copy link

rjb4standards commented Mar 8, 2023

The US Federal government requires federal agencies to follow NIST standards and guidelines, i.e. SP 800-218 and SP 800-161 RA-5, which defines NIST Vulnerability Disclosure Reports (VDR). There is no government requirement to provide a VEX document to indicate that a software product is not affected by a vulnerability. NIST VDR attestation is explained here

A VEX document, i.e. a negative security advisory, is burdensome and unnecessary, for consumer risk assessments

I also recommend reviewing the OWASP side-by-side comparison of VEX and VDR

@Tomalrich
Copy link

I've participated in the NTIA/now CISA VEX working group meetings since the second meeting in September 2020. You need to understand two facts about OpenVEX:
First, there is no approved CISA document called "Minimal Requirements". When Chainguard presented to this group more than a month ago, there was only a draft document with that name, that was still being debated by the VEX working group. This group is a collection of individuals convened under CISA's auspices, but is in no way a function of CISA. CISA has no regulatory authority for the private sector and can't define "requirements" for any organizations except federal agencies (of course, this document doesn't apply to federal agencies any more than it does the private sector). The document just describes guidelines that are the personal recommendations of some members of the VEX working group.
The document was approved by the working group two weeks ago, and now has to go through intensive vetting by CISA's lawyers, which may take a couple of months. Only then will it be an official document. CISA may well decide that they don't want to allow a document to be published under CISA's logo with a title like "Minimum Requirements" - so the document may still be amended or killed altogether. I want to point out that this document contradicts in several ways a document published a year ago by the working group, called "VEX Use Cases" (available at cisa.gov/sbom).
Second, the use case that "OpenVEX" addresses - removing false positives from vulnerability scans - has nothing to do with the primary VEX use case, which is identifying non-exploitable vulnerabilities identified for components listed in an SBOM for a particular version of a product. I personally like the OpenVEX use case and I don't care whether or not they use the term "VEX", but this has nothing to do with the NTIA/CISA VEX program.
I've written two blog posts on OpenVEX, available at "Tom Alrich's Blog". I will write a third post soon.

@dlorenc
Copy link
Contributor

dlorenc commented Mar 8, 2023

I'm not a voting member of the WG and my support is probably obvious, but non-binding +1 from me!

@Foxboron
Copy link
Contributor

Foxboron commented Mar 8, 2023

As I have previously stated in discussions around standards, I don't think this Working Group should get involved in standardization efforts beyond pointing out where existing standardization efforts occur.

It's a no from me.

@trevrosen
Copy link

I'm not a voting member of the WG either, but I'm a fan of VEX and like that OpenVEX avoids taking sides in the SBOM format debate. +1 from me.

@david-a-wheeler
Copy link
Contributor

david-a-wheeler commented Mar 8, 2023

A working group can decide if it will take on specification or formal standardization efforts, and on what (as long as it meets the usual OpenSSF requirements on scope, openness, licensing, etc.). In particular, formal standardization is a lot of work and shouldn't be taken on lightly.

However, I do want to clarify that formal standardization is a possible path for OpenSSF work. The OpenSSF Charter expressly denotes the recommended license for work that might lead to formal standardization. The Linux Foundation's Joint Development Foundation (JDF) is recognized as an ISO/IEC JTC 1 Publicly Available Specification (PAS) Submitter.

I don't think this proposal is recommending that it become a formal standard, just that the WG take this work on as a specification effort. If the desire is to make it a formal standard, that should be raised at some point (probably as a separate issue).

@dlorenc
Copy link
Contributor

dlorenc commented Mar 8, 2023

I don't think this proposal is recommending that it become a formal standard, just that the WG take this work on as a specification effort. If the desire is to make it a formal standard, that should be raised at some point (probably as a separate issue).

Correct. We've taken the necessary precautions to set ourselves up for that work using the community specification process, but there's a long road before we're ready to start it.

@rjb4standards
Copy link

I'm a little perplexed why this proposal wasn't brought to OASIS, which is already working on VEX. Why setup a "competing VEX initiative"? OASIS is an international standards organization, I worked with OASIS on the ebXML standard, now listed as ISO 15000 standard. Sorry, but this "fracturing" of VEX efforts makes no sense to me.

@JasonKeirstead
Copy link

I am not sure how we are tracking votes. I as well vote no.

Much like @Foxboron I disagree that this group should be throwing weight behind a competing standard to things that already exist, further complicating adoption of VEX in general by making more confusion. We should be rallying behind things that exist and making them better.

@costica11
Copy link

"like that OpenVEX avoids taking sides in the SBOM format debate"

@trevrosen Sorry, this is an incorrect statement. OpenVex/Chainguard staff do prefer SPDX and they have spread misinformation about CycloneDX in multiple meetings. They also had "closed" discussions with the SPDX team before making public announcements.

@mrutkows
Copy link

mrutkows commented Mar 8, 2023

No. Unless CISA (or other standards authority) adopts this variant of VEX, I am against endorsing OpenVEX. I also view it as having a fracturing effect at OASIS and SBOM standards groups are working towards unification. It is disingenuous to create/endorse something that competes with (and may overwrite) known work being done at associate organizations we recognize (like CISA and OASIS) without any attempt to encourage collaboration.

@rjb4standards
Copy link

REA has been processing SPDX and CycloneDX SBOM's for 3 years in SAG-PM and they are both viable, effective SBOM formats - no need to create drama where none needs to exist.
I will say, the CycloneDX community is very engaged and supportive of implementers. The SPDX community is also very supportive. You can't go wrong choosing either SPDX of CycloneDX.

@trevrosen
Copy link

@costica11 I'm merely pointing out that SBOM format agnosticism is a stated design goal in the spec's FAQ. 😄

@tpletcher-hpe
Copy link

+1 on this proposal.

@rgreinho
Copy link

rgreinho commented Mar 9, 2023

+1 👍

@anvega
Copy link

anvega commented Mar 9, 2023

VEX is key to automating the vulnerability remediation lifecycle, and OpenVEX is a step forward in that direction, +1.

@anoncam
Copy link

anoncam commented Mar 9, 2023

I'm not a voting member of the WG and my support is probably obvious, but non-binding +1 from me!

i don't know if i am able to vote but +1. So, superficially i am tracking openvex. Is it fair to say enablement with tooling to enable threat intel and management could help adoption and that an investment could be made to get this going? @shebashio is happy to find paths to enable. My bottom line is this is 100% an integral component or artifacts that make use of what often is not understood.

vulnerability data is mostly leveraged to identify code level hard exploits. Threat intel is a different beast.

@rjb4standards
Copy link

rjb4standards commented Mar 9, 2023

Based on some comments, I'm guessing some people may not be aware that VEX reports on software products that ARE NOT AFFECTED by a new vulnerability. A Security Advisory (SA) identifies products that ARE AFFECTED by a new vulnerability. This is the yin-yang view of the same CVE VEX=not affected SA=affected.
A NIST VDR is product based, it shows the vulnerability status of each component in a software product SBOM on an on-going basis (living document)

@SantiagoTorres
Copy link

+1! I'd love to see more tooling and OSS innovation around VEX through OpenVEX!

@trishankkarthik
Copy link

I'm not a part of the TSC or the WG, but I vote +1 for open standards and tooling for VEX, which I strongly believe we will need as a "negative SBOM" or even a "software disclaimer of materials" in order to be able to qualify SBOMs. I would have preferred a solution contained within SBOMs themselves, but this addition appears to be the best we can do for now.

@JasonKeirstead
Copy link

@trishankkarthik FYI there already are VEX Standards that can be embedded in in the SBOM, like CycloneDX VEX.

This request is to invent another one.

@stevespringett
Copy link

Well, this is interesting... OWASP, who is an OpenSSF associate member, has a VDR/VEX format. SPDX which is a another LF project is developing their own - to be compatible with OWASP CycloneDX. Having a third format with ties to OpenSSF would likely be a public relations issue for the foundation as it promotes continued fragmentation rather than unification.

Also, keep in mind that VEX is only half of the solution. The other half is VDR which is already a requirement in some federal and commercial instances.

@dlorenc
Copy link
Contributor

dlorenc commented Mar 9, 2023

For those chiming in - I'd kindly request that you take the time to review the presentation I shared today in the WG meeting: https://docs.google.com/presentation/d/1ekre4ML3tMZ8pODAdLKIwsi1BsiT_q3o_QifTKkW5L0/edit#slide=id.p

It addresses a lot of these questions.

This is a clearly a heated topic, so I'd also kindly request that we keep this issue on-topic and scoped to the vote @SecurityCRob initiated it with.

@JasonKeirstead
Copy link

@dlorenc The only two slides in that deck of substance - 13 and 14 - both have multuple statements each that are flat-out wrong. I agree we need to stick with the vote - that slide deck shouldn't factor into it as-is.

@brooklynrob
Copy link

brooklynrob commented Mar 9, 2023

@dlorenc There are a number of OpenSSF members in capital markets (GS, JPMC, Citi, MS, etc), and a number of those organizations block access to google docs (Slack too, btw) due to a variety of regulatory and other reasons. That's unlikely to change anytime soon. Would be great if important presentations like this were available through another channel such as download via GitHub. The continued insistence within LF communities to use google docs (and Slack) precludes organizations in highly regulated industries that can't use google docs from fully participating. CC @brianbehlendorf @mindthegab

@brianbehlendorf
Copy link

brianbehlendorf commented Mar 9, 2023 via email

@brooklynrob
Copy link

I think Rob means don't allow access or do block access. I agree with Rob but a path that doesn't substantially increase the cost of collaboration requires work to define beyond the scope of this WG and should be raised at the TAC. Brian
On March 9, 2023 4:34:33 AM GMT+01:00, Robert Underwood @.> wrote: @dlorenc There are a number of OpenSSF members in capital markets (GS, JPMC, Citi, etc), and a number of those organizations don't block access to google docs (Slack too, btw) due to a variety of regulatory and other reasons. That's unlikely to change anytime soon. Would be great if important presentations like this were available through another channels such as download via GitHub. The continued insistence within LF communities to use google docs (and Slack) precludes organizations in highly regulated industries that can't use google docs from fully participating. CC @brianbehlendorf @mindthegab -- Reply to this email directly or view it on GitHub: #125 (comment) You are receiving this because you were mentioned. Message ID: @.>
-- Sent from my Android device with K-9 Mail. Please excuse my brevity.

Yup. Edited my comment above. Apologies for the typo. Thank you @brianbehlendorf.

If y'all truly want banks at the table, along with their membership fees, this reality needs to be accounted for. In light of events such as the WhatApp fines to banks (google that if you're not familiar) this state of affairs is unlikely to change any time soon. Please don't assume all OpenSSF members can access Google docs. If you want to hold a vote, and want input from the community, level the playing field so everyone has the same access to all information. This issue has been raised many times, over many years, by the financial services participants in the LF. This is not new. Just PDF stuff and put it in a GitHub repo if you have to.

@brianbehlendorf
Copy link

Thanks Rob. I'll follow up on this in another forum, to return this topic to OpenVEX as a project within the OpenSSF.

@dlorenc
Copy link
Contributor

dlorenc commented Mar 9, 2023

@dlorenc The only two slides in that deck of substance - 13 and 14 - both have multuple statements each that are flat-out wrong. I agree we need to stick with the vote - that slide deck shouldn't factor into it as-is.

Jason - I've given you comment access to the document. I'd like to fix anything incorrect, please feel free to leave a comment there if anything seems wrong.

@dlorenc There are a number of OpenSSF members in capital markets (GS, JPMC, Citi, MS, etc), and a number of those organizations block access to google docs (Slack too, btw) due to a variety of regulatory and other reasons. That's unlikely to change anytime soon. Would be great if important presentations like this were available through another channel such as download via GitHub. The continued insistence within LF communities to use google docs (and Slack) precludes organizations in highly regulated industries that can't use google docs from fully participating. CC @brianbehlendorf @mindthegab

Thanks for calling this out! I've converted it into a PDF and attached it here.

OpenVEX.pdf

@costica11
Copy link

@dlorenc Thanks for the response. Are you saying that the complete statement is false or just a part of it? Could you please let us know what is the major "open" contribution constantly made by Google and VMware in developing OpenVEX prior to this PR openvex/community#6 ?

@oej
Copy link

oej commented Mar 13, 2023

@dlorenc "Hey lets go create a standard", is not how standards get developed in any of the standards bodies I've work in since 1992, including the IETF, Supply Chain Integrity, Transparency and Trust (SCITT) work group, which I'm currently working on.

I do not agree. IETF is open to work on a document if there's enough energy in a group wanting to take on the work. In some cases this has resulted in overlapping IETF RFCs which is just fine.

@oej , IETF has an entire process before a work group can be setup to work on a standard, this requires BOF's and a formal chartering process, before a work group is approved. It's definitely not a "rag tag" "ad hoc" thing, it's a well defined process that must be followed. That's my experience, yours may be different. I've worked in other ANSI SDO's and they all have similar requirements before standards development begins.

Absolutely. But that doesn't prevent competing proposals to get working groups. You have many standards for voice over the net, for presence and chat too.

@JasonKeirstead
Copy link

@dlorenc The only two slides in that deck of substance - 13 and 14 - both have multuple statements each that are flat-out wrong. I agree we need to stick with the vote - that slide deck shouldn't factor into it as-is.

Jason - I've given you comment access to the document. I'd like to fix anything incorrect, please feel free to leave a comment there if anything seems wrong.

I was out on PTO last week, so am just getting to this now. I have added all of my comments on that deck. I won't repeat them here but encourage others to go read them. The TL;DR for me is that the claims in those two slides are not data-driven - they are subjective, and seem written with a very specific point of view in mind (commercial - the "we" statements are not referring to the WG or OSSF). If they are data-driven, then the data should be provided...

@Foxboron
Copy link
Contributor

I have added all of my comments on that deck. I won't repeat them here but encourage others to go read them.

Just a heads-up that you can't see the comments added to the slides without having edit rights on the deck. Anyone casually following along to this issue can't see them.

@dlorenc
Copy link
Contributor

dlorenc commented Mar 13, 2023

Just a heads-up that you can't see the comments added to the slides without having edit rights on the deck. Anyone casually following along to this issue can't see them.

I've now opened up comment access. If it starts getting abused I'll have to drop it to a list specific to this WG or something. I don't see a way to allow viewing comments without adding them :(

@Foxboron
Copy link
Contributor

I've now opened up comment access. If it starts getting abused I'll have to drop it to a list specific to this WG or something. I don't see a way to allow viewing comments without adding them :(

Thanks!

@henkbirkholz
Copy link

Just a heads-up that you can't see the comments added to the slides without having edit rights on the deck. Anyone casually following along to this issue can't see them.

I've now opened up comment access. If it starts getting abused I'll have to drop it to a list specific to this WG or something. I don't see a way to allow viewing comments without adding them :(

Understood. Thank you for the benefit of doubt. Maybe comment on inappropriate comments for a while before considering doing permission churn again. I think the gesture is duly appreciated. One question: what does "this WG" refer to?

@AevaOnline
Copy link

One question: what does "this WG" refer to?

@henkbirkholz this discussion is occurring within a GitHub Issue within the Vulnerability Disclosure Working Group (WG). The URL for this Issue lists the WG name. This Issue opened a request for that WG to vote.

For more information on the OpenSSF's organizational structure and what Working Groups are in this context, please refer to the OSSF/TAC repository.

@dlorenc
Copy link
Contributor

dlorenc commented Mar 13, 2023

Understood. Thank you for the benefit of doubt. Maybe comment on inappropriate comments for a while before considering doing permission churn again. I think the gesture is duly appreciated. One question: what does "this WG" refer to?

Sorry folks, that didn't last long. I'm dropping permissions again to view only. Just click "request access" if you want to comment.

@ctcpip
Copy link
Member

ctcpip commented Mar 13, 2023

Projects must be aligned with the OpenSSF mission and either be a novel approach for existing areas or address an unfulfilled need.

Respectfully, OpenVEX doesn't pass this sniff test for OpenSSF project adoption.

@nathan-menhorn
Copy link

+1 OpenVEX seems really useful for filtering CVEs.

@tpepper
Copy link

tpepper commented Mar 14, 2023

I'm disappointed to have my team's motivations and by proxy the reputation of folks like rnjudge brought into this discussion. At VMware our emphasis is in doing what we can to contribute to the open source evolution of both standards and interoperable tools/process implementations in the software supply chain security space. Our initial involvement with this early OpenVEX project is directly aligned with both that and the track record visible with our involvement in areas like purl, OCI, SPDX, and even bringing CycloneDX support to tools we're interested in. Our involvement is because we believe the future needs actively bridged to be one in which the ecosystem is performing trustworthy exchange of artifacts and metadata, composed and consumed by diverse tools via common, machine readable formats (yes plural). It's unlikely that one solution will fit all sizes in this complex technical domain. Whether this proposal moves forward now, later, or not at all, please expect VMware to be contributing in these spaces and hopefully then with more time our presence comes to surprise people less.

@rjb4standards
Copy link

@tpepper I've worked with Rose Judge on SPDX and her honesty and integrity is impeccable.

@henkbirkholz
Copy link

One question: what does "this WG" refer to?

@henkbirkholz this discussion is occurring within a GitHub Issue within the Vulnerability Disclosure Working Group (WG). The URL for this Issue lists the WG name. This Issue opened a request for that WG to vote.

For more information on the OpenSSF's organizational structure and what Working Groups are in this context, please refer to the OSSF/TAC repository.

@AevaOnline Thanks. I am finding my bearings now.

@underkay
Copy link

+1 for OpenVEX adoption. VEX is an important development in the world of vulnerability management and this WG being a part of the growth and improvements through OpenVEX is a targeted and valuable way to contribute.

@jonmuk
Copy link

jonmuk commented Mar 16, 2023

+1
Work to do here but this is a great start / approach

@SecurityCRob
Copy link
Contributor Author

+1
I vote to adopt the OpenVEX project as a SIG underneath the Vuln Disclosure WG, help continue to develop the lightweight spec and associated tooling, coordinate with the larger VEX group, work with assorted other efforts like CSAF and tooling such as SPDX and CycloneDX, and work to make issuing all types of advisories more seamless and frictionless for oss developers.

@lehors
Copy link
Contributor

lehors commented Mar 16, 2023

I've hesitated to vote because like others I very much dislike the tone this discussion has taken but as it has been pointed out this proposal appear to fail the requirements set up by our process. On that basis I vote no.

If anything this should have helped Chainguard identify other interested parties and once they have beefed up a bit the community around this they should be in a better position to bring it here.

I would advise making an effort to better explain why this is needed. The main argument against using Vex seems to be that Vex is immature and lack adoption. I find that pretty unconvincing. I would prefer an approach that starts from Vex and that extends/modifies it if found necessary.
It also seems that one common motivation is to have tools. But why not build tools for Vex?

@SecurityCRob
Copy link
Contributor Author

No worries. Abstaining is perfectly legitimate (as is voting "for" or "against" a particular issue). Our goal is to let folks express their thoughts and opinions and ultimately give the members an opportunity to help shape our path forward. Healthy debate and dialog help us create stronger and more diverse ideas to support our communities and goals. I appreciate your participation!

@Tomalrich
Copy link

Tomalrich commented Mar 16, 2023 via email

@rjb4standards
Copy link

rjb4standards commented Mar 16, 2023

An example CycloneDX VDR is available here:
https://raw.githubusercontent.com/rjb4standards/REA-Products/master/CDXVEX/CDX14.xml
I refer to this as an "implied" VDR model, where only SBOM components with reported CVE are listed.
An explicit VDR model lists all SBOM components in a software product and their vulnerability status, including those with no reported vulnerabilities. https://raw.githubusercontent.com/rjb4standards/REA-Products/master/SBOMVDR_JSON/VDR_118.json

@JasonKeirstead
Copy link

JasonKeirstead commented Mar 16, 2023

Steve's blog is one of the most important links in this entire thread.

I have a different takeaway from it though, and it is actually what Steve himself says in the last sentence "Could it be that a hybrid approach of supporting both VDR and VEX is the way forward? In the end, hopefully, pragmatism will be the clear winner."

The sooner everyone agrees that the concepts of VDR and VEX are largely trying to do the same thing and the only reason they have different names is due to historical happenstance, and we should union the venn diagram and get it over with, the better this all will become.

@rjb4standards
Copy link

rjb4standards commented Mar 16, 2023

Full Disclosure: Over a year ago, REA offered to contribute the open-source VDR XML Schema to the Linux Foundation, no strings attached. The offer was not accepted. REA is prepared to withdraw our own open-source VDR format, if the community agrees to support the CycloneDX VDR format.

There are three distinctive concepts at play, which are completely different in their purpose:
CSAF Security Advisory = Purpose: Identify all products that ARE AFFECTED by a vulnerability
CSAF VEX = Purpose: Identify all products that ARE NOT AFFECTED by a vulnerability
NIST VDR = Purpose: For ONE specific Product/SBOM, list all vulnerabilities at the SBOM component level; living document

aDolus offers a more detailed description of the differences between VEX and VDR

NOTE: The aDolus article incorrectly states that a VDR is static. A VDR is a living document that is updated as needed and is always available at a known URL, as shown in the SPDX V2.3 spec

@costica11
Copy link

@tpepper Sorry my question to @dlorenc was not meant to challenge VMWare's open source contributions. I am aware of the great work that VMware and @rnjudge has contributed with to the other projects you have mentioned (purl, OCI, SPDX, etc. ) . However,  I could not find any major open contribution to the "Open"Vex projects. Also, @AevaOnline's questions were not answered. My intention is to just understand what exactly is VMWare and Google's major open contributions to the "Open"Vex project and how they have achieved maintainer status.

Some people who joined this voting process were taking part in the in-depth review of Notary V2 ( cncf/toc#981 ). Many inconsistencies can be found, in what the OpenVEX project says and what the reality actually is, by just doing a basic search on the openvex Github org ( https://github.com/openvex ).

If OpenVEX was like any other normal open source projects that organically joined OpenSSF, this wouldn't be an issue. But the OpenVEX project and Chainguard team have their own agenda and interest and they are taking advantage of their privilege as an OpenSSF TAC, GB member.  

  • The Chainguard has a preference for formats and they have spread misinformation about other formats and specs to promote OpenVEX.
  • The Chainguard team have contacted the L.F staff and they have pre-planned a potential submission to OpenSSF in the early days of the project. They have used their OpenSSF TAC role privilege for OpenVEX' project submission.
  • The Chainguard team used other organization names as maintainers to meet the OpenSSF requirements and media publicity.
  • I was informed that the format interoperability effort is impacted as the Chainguard team continues to spread misinformation through the media.

The adoption of "Open"VEX with OpenSSF will only result in keeping OpenSSF further away from other formats and in creating more conflicts. The OpenSSF shouldn't encourage projects like these that use OpenSSF as a platform for promoting their agenda.

I kindly request the TAC chair (@bobcallaway) and vice chair (@AevaOnline) to review these allegations, evidence related to my statements can be provided if needed.

@tracymiranda
Copy link

OK it's my turn to express disappointment to have my team's motivations and by proxy the reputation of folks like puerco brought into this discussion. At Chainguard we are committed to making open source software secure by default and driving technologies to solve problems as we come across them.

While a great deal has been made of maintainership in this issue I will call out that there is as yet not enough clarity from the TAC around process and requirements around accepting projects as top level ones vs under the auspices of the working group. And I will highlight that there are current OpenSSF projects under working groups with only maintainers from single organizations e.g. S2C2F. Nevertheless OpenVEX aims to build a strong community and bootstrapped with maintainers from multiple orgs.

To clarify some aspects of open source and the OpenSSF:

  • We see open source as win/win, a rising tide that raises all boats. Starting a new project does not automatically create conflict or division - this is a zero-sum game mindset that we try to avoid. There are many great examples (e.g. in CNCF of seemingly competing projects thriving)
  • Anyone is able to plan or propose a new project to the OpenSSF at any stage of the project to a working group.
  • The GB or OpenSSF itself have nothing to do with projects being accepted to the OpenSSF. The TAC members have no special privilege for project submission.
  • Simply because you disagree with what someone says does not automatically make it misinformation. And if items need clarification or correction ourselves and media publications are happy to listen, please reach out.
  • Chainguard have been active participants in the SPDX & CycloneDX interoperability effort which we see as extremely important, we are not the party leaving the table.

We will continue to drive for interoperability where possible, and new elegant solutions where it makes sense - all in service of making open source secure by default.

@tpepper
Copy link

tpepper commented Mar 16, 2023

My intention is to just understand what exactly is VMWare and Google's major open contributions to the "Open"Vex project and how they have achieved maintainer status.

Primarily I want to comment on voting process and selection criteria relative to OpenSSF: At this point it's quite unclear what criteria voters are applying here. Multiple comments in the thread have these ambiguous notions of "major" or "enough" in ways not backed clearly by the project lifecycle.
OpenSSF needs better metrics of sufficiency for sandboxing and subsequent graduation.

Second though, trying to put on the hat of a reviewer looking at git repos and this new org on GitHub, and knowing of the quality and passion of folks like @cpanato, @puerco, and @rnjudge: It looks like common co-travelers openly and collaboratively doing early initial review/comment, and that participation then elevating to a bootstrap role. That's not exactly uncommon in open source, and I'd argue is even laudable. Bootstrap may be followed by formal elections. Or not? Governance of tiny early projects is different from large established ones. The project though should have documented process for it, OpenSSF should expect that, and even maybe offer templates.

I can't speak to @costica11 's other comments as I have literally zero knowledge of anything related to activity which may predate that open collaboration on the openvex git repos. (I do suspect the same types of clarifying process and documentation improvements in OpenSSF might have helped with the Notary situation they reference.)

Again it feels strangely unfortunate that we're in a position where taking an initial open source collaborative interest in something published on GitHub is suddenly a negative for individuals and a project.

@SecurityCRob
Copy link
Contributor Author

OK folks, I want to thank everyone for their patience and perseverance through this last week. At this stage, we are going to pause comments on this issue and speak at the next TAC call about this matter. At this point, I count voting 10 members expressing agreement to adopt the project and 5 members turning it down. After our TAC meeting I will be reaching out to the outstanding eligible members to see if they are willing and interested in participating.

@ossf ossf locked as too heated and limited conversation to collaborators Mar 17, 2023
@SecurityCRob
Copy link
Contributor Author

A majority of members have expressed their opinion and voted for this issue.
Summarizing: 11 working group members have expressed their approval to adopt this project as a sandbox software project and a SIG underneath our working group. 5 members voted to not adopt. Additionally, 14 non-members express support to adopt this and 4 non-members opposed the idea.

We will move forward to legal review/ip-transfer and request the TAC formally votes to confirm the group's desired path forward. Thank you to everyone that participated in this conversation, and we look forward to everyone continuing to collaborate as we move forward.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
Projects
None yet
Development

No branches or pull requests